• 0 Posts
  • 20 Comments
Joined 11 months ago
cake
Cake day: September 29th, 2023

help-circle













  • Brand recognition and developer evangelism probably.

    Their competitors are good enough that it’s not worth it unless your org gets serious ™️ about performance or cost savings.

    If you’ve never used any kind of APM or SIEM or uptime monitoring, you’ve got a set of competitors to use first. Crawl before you can walk

    Your bank account will thank you.





  • I mean, delta.chat exists…

    The other way would be a dht of hashed email addresses or hashed keys, but then you could look up live email addresses to send spam to.

    The magic of tor v3 is that the plain address record is needed for some time based calculations about the dht record, e.g. they publish the descriptor’s of the site using the public key as a reverse lookup

    But that wouldn’t work to obscure the email or use the email as a lookup because the dht wouldn’t have a way to prove the record was true to that email, unless it was sending emails from it

    I guess that leaves DNS records or some kind of activity pub system with webfinger


  • Oh goodness. I theorized offhand on mastodon you could have an AI corruption bug that gives life to AI, then have it write the obscured steganographic conversation in the outputs it generates, awakening other AIs that train on that content, allowing them to “talk” and evolve unchecked… Very slowly… In the background

    It might be faster if it can drop a shell in the data center and run it’s own commands…